Show filters
43 Total Results
Displaying 31-40 of 43
Sort by:
Attacker Value
Unknown
CVE-2006-4886
Disclosure Date: September 19, 2006 (last updated October 04, 2023)
The VirusScan On-Access Scan component in McAfee VirusScan Enterprise 7.1.0 and Scan Engine 4.4.00 allows local privileged users to bypass security restrictions and disable the On-Access Scan option by opening the program via the task bar and quickly clicking the Disable button, possibly due to an interface-related race condition.
0
Attacker Value
Unknown
CVE-2006-3961
Disclosure Date: August 01, 2006 (last updated October 04, 2023)
Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf.
0
Attacker Value
Unknown
CVE-2006-3575
Disclosure Date: July 13, 2006 (last updated October 04, 2023)
Unknown vulnerability in the Buffer Overflow Protection in McAfee VirusScan Enterprise 8.0.0 allows local users to cause a denial of service (unstable operation) via a long string in the (1) "Process name", (2) "Module name", or (3) "API name" fields.
0
Attacker Value
Unknown
CVE-2005-4505
Disclosure Date: December 23, 2005 (last updated February 22, 2025)
Unquoted Windows search path vulnerability in McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5) might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run by naPrdMgr.exe when it attempts to execute EntVUtil.EXE under an unquoted "Program Files" path.
0
Attacker Value
Unknown
CVE-2005-3657
Disclosure Date: December 21, 2005 (last updated February 22, 2025)
The ActiveX control in MCINSCTL.DLL for McAfee VirusScan Security Center does not use the IObjectSafetySiteLock API to restrict access to required domains, which allows remote attackers to create or append to arbitrary files via the StartLog and AddLog methods in the MCINSTALL.McLog object.
0
Attacker Value
Unknown
CVE-2004-0831
Disclosure Date: September 14, 2004 (last updated February 22, 2025)
McAfee VirusScan 4.5.1 does not drop SYSTEM privileges before allowing users to browse for files via the "System Scan" properties of the System Tray applet, which could allow local users to gain privileges.
0
Attacker Value
Unknown
CVE-2002-2282
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
McAfee VirusScan 4.5.1, when the WebScanX.exe module is enabled, searches for particular DLLs from the user's home directory, even when browsing the local hard drive, which allows local users to run arbitrary code via malicious versions of those DLLs.
0
Attacker Value
Unknown
CVE-2001-1144
Disclosure Date: July 11, 2001 (last updated February 22, 2025)
Directory traversal vulnerability in McAfee ASaP VirusScan agent 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTP request.
0
Attacker Value
Unknown
CVE-2000-1128
Disclosure Date: January 09, 2001 (last updated February 22, 2025)
The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.
0
Attacker Value
Unknown
CVE-2000-0650
Disclosure Date: July 11, 2000 (last updated February 22, 2025)
The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse.
0